DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Integrity

12/18/2022

0 Comments

 
Information or Data should be protected against any unauthorized changes. Integrity preserves the accuracy and completeness of the information. Let me ask you this question?

How will you verify that the software you download is an authentic or original executable/binary published by the software provider? 
- Software companies generally publish the hash value of the software along with it. To verify the integrity of the software, you'll compute the executable hash and match it with the one posted by the software provider.

0 Comments

Confidentiality

12/18/2022

0 Comments

 
Confidentiality: It's a pretty straightforward concept - Just like your phone, wallet, or bank account, only authorized entities have access to the data. Think about your Bank account to remember this concept.
Your bank credentials are exclusive to your account and must not be shared with anyone else. 
 
What if the bank starts sharing your data with another customer - will you trust the back?
I guess "No." Therefore, authorized entities should only access information to build trust between the organization and the customer.
​
0 Comments

    Archives

    December 2022

    Categories

    All

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity